IEEE Transactions on Dependable and Secure Computing (TDSC) publishes archival research results focusing on research into foundations, methodologies, and mechanisms that support the achievement–through design, modeling, and evaluation–of systems and networks that are dependable and secure to the desired degree without compromising performance. The focus also includes measurement, modeling, and simulation techniques, and foundations for jointly evaluating, verifying, and designing for performance, security, and dependability constraints.
IEEE Transactions on Trustable and Secure Computing(TDSC)发布了档案研究结果,重点研究通过设计、建模和评估支持系统和网络实现所需程度的可靠性和安全性而不影响性能的基础、方法和机制。重点还包括测量、建模和仿真技术,以及联合评估、验证和设计性能、安全性和可靠性约束的基础。
Yes, Machine Learning Can Be More Secure! A Case Study on Android Malware Detection
来源期刊:IEEE Transactions on Dependable and Secure ComputingDOI:10.1109/TDSC.2017.2700270
Social Network De-Anonymization and Privacy Inference with Knowledge Graph Model
来源期刊:IEEE Transactions on Dependable and Secure ComputingDOI:10.1109/TDSC.2017.2697854
Brew: A Security Policy Analysis Framework for Distributed SDN-Based Cloud Environments
来源期刊:IEEE Transactions on Dependable and Secure ComputingDOI:10.1109/TDSC.2017.2726066
Privacy-Preserving Attribute-Based Keyword Search in Shared Multi-owner Setting
来源期刊:IEEE Transactions on Dependable and Secure ComputingDOI:10.1109/TDSC.2019.2897675
Exact Inference Techniques for the Analysis of Bayesian Attack Graphs
来源期刊:IEEE Transactions on Dependable and Secure ComputingDOI:10.1109/TDSC.2016.2627033
AccConF: An Access Control Framework for Leveraging In-Network Cached Data in the ICN-Enabled Wireless Edge
来源期刊:IEEE Transactions on Dependable and Secure ComputingDOI:10.1109/TDSC.2017.2672991
Privacy-Aware Caching in Information-Centric Networking
来源期刊:IEEE Transactions on Dependable and Secure ComputingDOI:10.1109/TDSC.2017.2679711
A Lightweight Privacy-Preserving CNN Feature Extraction Framework for Mobile Sensing
来源期刊:IEEE Transactions on Dependable and Secure ComputingDOI:10.1109/TDSC.2019.2913362
FS-PEKS: Lattice-based Forward Secure Public-key Encryption with Keyword Search for Cloud-assisted Industrial Internet of Things
来源期刊:IEEE Transactions on Dependable and Secure ComputingDOI:10.1109/TDSC.2019.2914117
Security Pricing as Enabler of Cyber-Insurance A First Look at Differentiated Pricing Markets
来源期刊:IEEE Transactions on Dependable and Secure ComputingDOI:10.1109/TDSC.2017.2684801
GaitLock: Protect Virtual and Augmented Reality Headsets Using Gait
来源期刊:IEEE Transactions on Dependable and Secure ComputingDOI:10.1109/TDSC.2018.2800048
Invisible Backdoor Attacks on Deep Neural Networks via Steganography and Regularization
来源期刊:IEEE Transactions on Dependable and Secure ComputingDOI:10.1109/tdsc.2020.3021407
Efficient and Secure Decision Tree Classification for Cloud-Assisted Online Diagnosis Services
来源期刊:IEEE Transactions on Dependable and Secure ComputingDOI:10.1109/TDSC.2019.2922958
Resource-Aware Detection and Defense System Against Multi-Type Attacks in the Cloud: Repeated Bayesian Stackelberg Game
来源期刊:IEEE Transactions on Dependable and Secure ComputingDOI:10.1109/TDSC.2019.2907946
Robust and Universal Seamless Handover Authentication in 5G HetNets
来源期刊:IEEE Transactions on Dependable and Secure ComputingDOI:10.1109/TDSC.2019.2927664
Memory-Efficient Implementation of Elliptic Curve Cryptography for the Internet-of-Things
来源期刊:IEEE Transactions on Dependable and Secure ComputingDOI:10.1109/TDSC.2018.2825449
Design and Implementation of the Ascend Secure Processor
来源期刊:IEEE Transactions on Dependable and Secure ComputingDOI:10.1109/TDSC.2017.2687463
De-SAG: On the De-Anonymization of Structure-Attribute Graph Data
来源期刊:IEEE Transactions on Dependable and Secure ComputingDOI:10.1109/TDSC.2017.2712150
PrivHome: Privacy-Preserving Authenticated Communication in Smart Home Environment
来源期刊:IEEE Transactions on Dependable and Secure ComputingDOI:10.1109/TDSC.2019.2914911
Efficient Multi-Factor Authenticated Key Exchange Scheme for Mobile Communications
来源期刊:IEEE Transactions on Dependable and Secure ComputingDOI:10.1109/TDSC.2017.2700305
G-SIR: An Insider Attack Resilient Geo-Social Access Control Framework
来源期刊:IEEE Transactions on Dependable and Secure ComputingDOI:10.1109/TDSC.2017.2654438
PersonaIA: A Lightweight Implicit Authentication System Based on Customized User Behavior Selection
来源期刊:IEEE Transactions on Dependable and Secure ComputingDOI:10.1109/TDSC.2016.2645208
Lossless Data Hiding Based on Homomorphic Cryptosystem
来源期刊:IEEE Transactions on Dependable and Secure ComputingDOI:10.1109/TDSC.2019.2913422
IDEA: Intrusion Detection through Electromagnetic-Signal Analysis for Critical Embedded and Cyber-Physical Systems
来源期刊:IEEE Transactions on Dependable and Secure ComputingDOI:10.1109/TDSC.2019.2932736
RACOON++: A Semi-Automatic Framework for the Selfishness-Aware Design of Cooperative Systems
来源期刊:IEEE Transactions on Dependable and Secure ComputingDOI:10.1109/TDSC.2017.2706286
Private Compound Wildcard Queries Using Fully Homomorphic Encryption
来源期刊:IEEE Transactions on Dependable and Secure ComputingDOI:10.1109/TDSC.2017.2763593
SDN-Based Privacy Preserving Cross Domain Routing
来源期刊:IEEE Transactions on Dependable and Secure ComputingDOI:10.1109/TDSC.2018.2811807
Immersive Virtual Reality Attacks and the Human Joystick
来源期刊:IEEE Transactions on Dependable and Secure ComputingDOI:10.1109/TDSC.2019.2907942
Empirical Analysis and Validation of Security Alerts Filtering Techniques
来源期刊:IEEE Transactions on Dependable and Secure ComputingDOI:10.1109/TDSC.2017.2714164
CATTmew: Defeating Software-only Physical Kernel Isolation
来源期刊:IEEE Transactions on Dependable and Secure ComputingDOI:10.1109/tdsc.2019.2946816
Refinement-Based Specification and Security Analysis of Separation Kernels
来源期刊:IEEE Transactions on Dependable and Secure ComputingDOI:10.1109/TDSC.2017.2672983
Denoising in the Dark: Privacy-Preserving Deep Neural Network Based Image Denoising
来源期刊:IEEE Transactions on Dependable and Secure ComputingDOI:10.1109/TDSC.2019.2907081
AP-PRE: Autonomous Path Proxy Re-Encryption and Its Applications
来源期刊:IEEE Transactions on Dependable and Secure ComputingDOI:10.1109/TDSC.2017.2714166
Tool of Spies: Leaking your IP by Altering the 3D Printer Compiler
来源期刊:IEEE Transactions on Dependable and Secure ComputingDOI:10.1109/TDSC.2019.2923215
Multitenant Access Control for Cloud-Aware Distributed Filesystems
来源期刊:IEEE Transactions on Dependable and Secure ComputingDOI:10.1109/TDSC.2017.2715839
DeepFuzzer: Accelerated Deep Greybox Fuzzing
来源期刊:IEEE Transactions on Dependable and Secure ComputingDOI:10.1109/tdsc.2019.2961339
Reducing Timing Side-Channel Information Leakage Using 3D Integration
来源期刊:IEEE Transactions on Dependable and Secure ComputingDOI:10.1109/TDSC.2017.2712156
A Mixing Scheme Using a Decentralized Signature Protocol for Privacy Protection in Bitcoin Blockchain
来源期刊:IEEE Transactions on Dependable and Secure ComputingDOI:10.1109/tdsc.2019.2938953
KALD: Detecting Direct Pointer Disclosure Vulnerabilities
来源期刊:IEEE Transactions on Dependable and Secure ComputingDOI:10.1109/TDSC.2019.2915829
Mobile Crowdsourcing Task Allocation with Differential-and-Distortion Geo-Obfuscation
来源期刊:IEEE Transactions on Dependable and Secure ComputingDOI:10.1109/TDSC.2019.2912886
Stochastic Model Checking for Predicting Component Failures and Service Availability
来源期刊:IEEE Transactions on Dependable and Secure ComputingDOI:10.1109/TDSC.2017.2650901
Looking Back! Using Early Versions of Android Apps as Attack Vectors
来源期刊:IEEE Transactions on Dependable and Secure ComputingDOI:10.1109/TDSC.2019.2914202
A Highly Efficient Side Channel Attack with Profiling through Relevance-Learning on Physical Leakage Information
来源期刊:IEEE Transactions on Dependable and Secure ComputingDOI:10.1109/TDSC.2018.2864727
PSpec-SQL: Enabling Fine-Grained Control for Distributed Data Analytics
来源期刊:IEEE Transactions on Dependable and Secure ComputingDOI:10.1109/TDSC.2019.2914209
SAIS: Self-Adaptive Identification of Security Bug Reports
来源期刊:IEEE Transactions on Dependable and Secure ComputingDOI:10.1109/tdsc.2019.2939132
An Integrated Privacy Preserving Attribute Based Access Control Framework Supporting Secure Deduplication
来源期刊:IEEE Transactions on Dependable and Secure ComputingDOI:10.1109/tdsc.2019.2946073
STYX: A Hierarchical Key Management System Oriented to Elastic Content Delivery Networks on Public Clouds
来源期刊:IEEE Transactions on Dependable and Secure ComputingDOI:10.1109/TDSC.2019.2918278
Security of streaming media communications with logistic map and self-adaptive detection-based steganography
来源期刊:IEEE Transactions on Dependable and Secure ComputingDOI:10.1109/tdsc.2019.2946138
Another Look at Anonymous Communication
来源期刊:IEEE Transactions on Dependable and Secure ComputingDOI:10.1109/TDSC.2018.2828002
PVOPM: Verifiable Privacy-preserving Pattern Matching with Efficient Outsourcing in the Malicious Setting
来源期刊:IEEE Transactions on Dependable and Secure ComputingDOI:10.1109/tdsc.2019.2947436